2023-02-26 10:02:30 +00:00
|
|
|
package certs
|
|
|
|
|
|
|
|
import (
|
2023-02-26 13:06:15 +00:00
|
|
|
"encoding/json"
|
2024-07-09 23:09:18 +00:00
|
|
|
"fmt"
|
2023-02-26 13:06:15 +00:00
|
|
|
"os"
|
|
|
|
"strings"
|
2023-02-26 13:35:07 +00:00
|
|
|
"time"
|
2023-02-26 10:02:30 +00:00
|
|
|
|
2023-02-26 13:35:07 +00:00
|
|
|
"github.com/go-acme/lego/v4/certcrypto"
|
2023-02-26 10:02:30 +00:00
|
|
|
"github.com/go-acme/lego/v4/certificate"
|
|
|
|
"github.com/go-acme/lego/v4/challenge/dns01"
|
|
|
|
"github.com/go-acme/lego/v4/lego"
|
2024-07-19 00:24:11 +00:00
|
|
|
"local-ip.sh/utils"
|
2023-02-26 10:02:30 +00:00
|
|
|
"local-ip.sh/xip"
|
|
|
|
)
|
|
|
|
|
|
|
|
type certsClient struct {
|
2024-07-09 23:09:18 +00:00
|
|
|
legoClient *lego.Client
|
|
|
|
lastWildcardCertificate *certificate.Resource
|
|
|
|
lastRootCertificate *certificate.Resource
|
2023-02-26 10:02:30 +00:00
|
|
|
}
|
|
|
|
|
2024-07-09 23:09:18 +00:00
|
|
|
func (c *certsClient) RequestCertificates() {
|
|
|
|
c.requestCertificate("wildcard")
|
|
|
|
c.requestCertificate("root")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *certsClient) requestCertificate(certType string) {
|
|
|
|
var lastCertificate *certificate.Resource
|
|
|
|
var domains []string
|
|
|
|
if certType == "wildcard" {
|
|
|
|
lastCertificate = c.lastWildcardCertificate
|
|
|
|
domains = []string{"*.local-ip.sh"}
|
|
|
|
} else if certType == "root" {
|
|
|
|
lastCertificate = c.lastRootCertificate
|
|
|
|
domains = []string{"local-ip.sh"}
|
|
|
|
} else {
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Fatal().Msgf("Unexpected certType %s. Only \"wildcard\" and \"root\" are supported", certType)
|
2024-07-09 23:09:18 +00:00
|
|
|
}
|
|
|
|
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Info().Str("certType", certType).Msg("Requesting certificate")
|
2024-07-09 23:09:18 +00:00
|
|
|
if lastCertificate != nil {
|
|
|
|
certificates, err := certcrypto.ParsePEMBundle(c.lastWildcardCertificate.Certificate)
|
2023-02-26 13:35:07 +00:00
|
|
|
if err != nil {
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Fatal().Err(err).Msg("Failed to parse PEM bundle from last certificate")
|
2023-02-26 13:35:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
x509Cert := certificates[0]
|
|
|
|
timeLeft := x509Cert.NotAfter.Sub(time.Now().UTC())
|
|
|
|
if timeLeft > time.Hour*24*30 {
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Info().Msgf("%d days left before expiration, skip renewal", int(timeLeft.Hours()/24))
|
2023-02-26 13:35:07 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-07-09 23:09:18 +00:00
|
|
|
c.renewCertificates()
|
2023-02-26 13:06:15 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-07-19 00:24:11 +00:00
|
|
|
cert, err := c.legoClient.Certificate.Obtain(certificate.ObtainRequest{Domains: domains, Bundle: true})
|
2023-02-26 10:02:30 +00:00
|
|
|
if err != nil {
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Fatal().Err(err).Msg("Failed to obtain certificate from lego client")
|
2023-02-26 10:02:30 +00:00
|
|
|
}
|
|
|
|
|
2024-07-09 23:09:18 +00:00
|
|
|
if certType == "wildcard" {
|
2024-07-19 00:24:11 +00:00
|
|
|
c.lastWildcardCertificate = cert
|
2024-07-09 23:09:18 +00:00
|
|
|
} else if certType == "root" {
|
2024-07-19 00:24:11 +00:00
|
|
|
c.lastRootCertificate = cert
|
2024-07-09 23:09:18 +00:00
|
|
|
}
|
|
|
|
|
2024-07-19 00:24:11 +00:00
|
|
|
persistFiles(cert, certType)
|
2023-02-26 13:06:15 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2024-07-09 23:09:18 +00:00
|
|
|
func (c *certsClient) renewCertificates() {
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Info().Msg("Renewing certificates")
|
|
|
|
|
2024-07-09 23:09:18 +00:00
|
|
|
wildcardCertificate, err := c.legoClient.Certificate.Renew(*c.lastWildcardCertificate, true, false, "")
|
2023-02-26 13:06:15 +00:00
|
|
|
if err != nil {
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Fatal().Err(err).Msg("Failed to renew wildcard certificate")
|
2023-02-26 13:06:15 +00:00
|
|
|
}
|
2024-07-09 23:09:18 +00:00
|
|
|
c.lastWildcardCertificate = wildcardCertificate
|
|
|
|
persistFiles(wildcardCertificate, "wildcard")
|
2023-02-26 13:06:15 +00:00
|
|
|
|
2024-07-09 23:09:18 +00:00
|
|
|
rootCertificate, err := c.legoClient.Certificate.Renew(*c.lastRootCertificate, true, false, "")
|
|
|
|
if err != nil {
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Fatal().Err(err).Msg("Failed to renew root certificate")
|
2024-07-09 23:09:18 +00:00
|
|
|
}
|
|
|
|
c.lastRootCertificate = rootCertificate
|
|
|
|
persistFiles(rootCertificate, "root")
|
2023-02-26 13:06:15 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2024-07-09 23:09:18 +00:00
|
|
|
func persistFiles(certificates *certificate.Resource, certType string) {
|
2024-07-19 00:24:11 +00:00
|
|
|
err := os.MkdirAll(fmt.Sprintf("/certs/%s", certType), 0o755)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger.Fatal().Err(err).Msgf("Failed to mkdir /certs/%s", certType)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = os.WriteFile(fmt.Sprintf("/certs/%s/server.pem", certType), certificates.Certificate, 0o644)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger.Fatal().Err(err).Msgf("Failed to save /certs/%s/server.pem", certType)
|
|
|
|
}
|
|
|
|
|
2024-07-09 23:09:18 +00:00
|
|
|
os.WriteFile(fmt.Sprintf("/certs/%s/server.key", certType), certificates.PrivateKey, 0o644)
|
2024-07-19 00:24:11 +00:00
|
|
|
if err != nil {
|
|
|
|
utils.Logger.Fatal().Err(err).Msgf("Failed to save /certs/%s/server.key", certType)
|
|
|
|
}
|
|
|
|
|
2023-02-26 13:06:15 +00:00
|
|
|
jsonBytes, err := json.MarshalIndent(certificates, "", "\t")
|
|
|
|
if err != nil {
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Fatal().Err(err).Msg("Failed to marshal certificates to JSON")
|
|
|
|
}
|
|
|
|
|
|
|
|
err = os.WriteFile(fmt.Sprintf("/certs/%s/output.json", certType), jsonBytes, 0o644)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger.Fatal().Err(err).Msgf("Failed to save /certs/%s/output.json", certType)
|
2023-02-26 13:06:15 +00:00
|
|
|
}
|
2023-02-26 10:02:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewCertsClient(xip *xip.Xip, user *Account) *certsClient {
|
|
|
|
config := lego.NewConfig(user)
|
|
|
|
config.CADirURL = caDirUrl
|
|
|
|
legoClient, err := lego.NewClient(config)
|
|
|
|
if err != nil {
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Fatal().Err(err).Msg("Failed to initialize lego client")
|
2023-02-26 10:02:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
provider := newProviderLocalIp(xip)
|
2023-02-26 13:06:15 +00:00
|
|
|
legoClient.Challenge.SetDNS01Provider(provider, dns01.AddRecursiveNameservers([]string{"1.1.1.1:53", "8.8.8.8:53"}), dns01.DisableCompletePropagationRequirement())
|
|
|
|
|
2024-07-09 23:09:18 +00:00
|
|
|
lastWildcardCertificate := getLastCertificate(legoClient, "wildcard")
|
|
|
|
lastRootCertificate := getLastCertificate(legoClient, "root")
|
2023-02-26 10:02:30 +00:00
|
|
|
|
|
|
|
return &certsClient{
|
|
|
|
legoClient,
|
2024-07-09 23:09:18 +00:00
|
|
|
lastWildcardCertificate,
|
|
|
|
lastRootCertificate,
|
2023-02-26 10:02:30 +00:00
|
|
|
}
|
|
|
|
}
|
2023-02-26 13:06:15 +00:00
|
|
|
|
2024-07-09 23:09:18 +00:00
|
|
|
func getLastCertificate(legoClient *lego.Client, certType string) *certificate.Resource {
|
|
|
|
jsonBytes, err := os.ReadFile(fmt.Sprintf("/certs/%s/output.json", certType))
|
2023-02-26 13:06:15 +00:00
|
|
|
if err != nil {
|
|
|
|
if strings.Contains(err.Error(), "no such file or directory") {
|
|
|
|
return nil
|
|
|
|
}
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Error().Err(err).Msg("Failling back to getting a brand new cert")
|
2023-02-26 13:06:15 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-12-12 21:25:39 +00:00
|
|
|
lastCertificate := &certificate.Resource{}
|
2023-02-26 13:06:15 +00:00
|
|
|
err = json.Unmarshal(jsonBytes, lastCertificate)
|
|
|
|
if err != nil {
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Error().Err(err).Msg("Failling back to getting a brand new cert")
|
2023-02-26 13:06:15 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
lastCertificate, err = legoClient.Certificate.Get(lastCertificate.CertURL, true)
|
|
|
|
if err != nil {
|
2024-07-19 00:24:11 +00:00
|
|
|
utils.Logger.Error().Err(err).Msg("Failling back to getting a brand new cert")
|
2023-02-26 13:06:15 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return lastCertificate
|
|
|
|
}
|